The NSDP protocol implementation on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices was not properly validating the length of string parameters sent in write requests, potentially allowing denial of service attacks.
References
Configurations
History
15 Mar 2021, 19:45
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ - Vendor Advisory | |
CPE | cpe:2.3:o:netgear:jgs516pe_firmware:2.6.0.43:*:*:*:*:*:*:* cpe:2.3:h:netgear:jgs516pe:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:gs116e_firmware:2.6.0.43:*:*:*:*:*:*:* cpe:2.3:h:netgear:gs116e:v2:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 5.2
v3 : 6.8 |
CWE | CWE-120 |
10 Mar 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-03-10 18:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-35225
Mitre link : CVE-2020-35225
CVE.ORG link : CVE-2020-35225
JSON object : View
Products Affected
netgear
- gs116e_firmware
- gs116e
- jgs516pe
- jgs516pe_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')